• Title/Summary/Keyword: User-Level

Search Result 2,647, Processing Time 0.027 seconds

A Study on Lambertian Color Segmentation and Canny Edge Detection Algorithms for Automatic Display Detection in CamCom (저속 카메라 통신용 자동 디스플레이 검출을 위한 Lambertian 색상 분할 및 Canny Edge Detection 알고리즘 연구)

  • Han, Jungdo;Said, Ngumanov;Vadim, Li;Cha, Jaesang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.5
    • /
    • pp.615-622
    • /
    • 2018
  • Recent advancements in camera communication (CamCom) technology using visible light exploited to use display as an luminance source to modulate the data for visible light data communication. The existing display-CamCom techniques uses the selected region of interest based camera capturing approach to detect and decode the 2D color coded data on display screen. This is not effective way to do communicate when the user on mobility. This paper propose the automatic display detection using Lambertian color segmentation combined with canny edge detection algorithms for CamCom in order to avoid manual region of interest selection to establish communication link between display and camera. The automatic display detection methods fails using conventional edge detection algorithms when content changes dynamically in displays. In order to solve this problem lambertian color segmentation combined with canny edge detection algorithms are proposed to detect display automatically. This research analysed different algorithms on display edge recognition and measured the performance on rendering dynamically changing content with color code on display. The display detection rate is achieved around 96% using this proposed solutions.

Android Malware Analysis Technology Research Based on Naive Bayes (Naive Bayes 기반 안드로이드 악성코드 분석 기술 연구)

  • Hwang, Jun-ho;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1087-1097
    • /
    • 2017
  • As the penetration rate of smartphones increases, the number of malicious codes targeting smartphones is increasing. I 360 Security 's smartphone malware statistics show that malicious code increased 437 percent in the first quarter of 2016 compared to the fourth quarter of 2015. In particular, malicious applications, which are the main means of distributing malicious code on smartphones, are aimed at leakage of user information, data destruction, and money withdrawal. Often, it is operated by an API, which is an interface that allows you to control the functions provided by the operating system or programming language. In this paper, we propose a mechanism to detect malicious application based on the similarity of API pattern in normal application and malicious application by learning pattern of API in application derived from static analysis. In addition, we show a technique for improving the detection rate and detection rate for each label derived by using the corresponding mechanism for the sample data. In particular, in the case of the proposed mechanism, it is possible to detect when the API pattern of the new malicious application is similar to the previously learned patterns at a certain level. Future researches of various features of the application and applying them to this mechanism are expected to be able to detect new malicious applications of anti-malware system.

A Preliminary Study on Usability of Unmanned Aerial Vehicles in Observing Park Users - Focused on Urban Parks in Busan - (공원 이용 실태 조사를 위한 무인비행장치의 활용성 연구 - 부산시 도시공원을 사례로 -)

  • Park, Keunhyun;Park, Sungburm
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.44 no.4
    • /
    • pp.35-44
    • /
    • 2016
  • Two primary tools to study park use are surveys and direct observation. Existing methods, however, are limited in terms of considerable costs in both time and money and the personal bias of respondents or observers. These limitations result in a lack of efficient, reliable, and affordable tools to investigate park use. This study explores the reliability and usability of unmanned aerial vehicles(UAVs) to explore park use in urban parks in Busan metropolitan city. By comparing with a systematic observation tool, SOPARC(System for Observing Play and Recreation in Communities), this study finds that the number of park users observed by two different techniques are highly correlated and not significantly different with each other. In addition, both methods show a high level of test-retest reliability. Comparing to existing methods, the UAV-using observation tool could cover larger target areas and is suitable to count park users in a more reliable and efficient way and map their use patterns, although it is weak in collecting detailed user information and surveying under poor conditions such as rain. Thus, the UAV method could complement direct observation. This study suggests practical implications of a UAV method to study park use.

Path-based In-network Join Processing for Event Detection and Filtering in Sensor Networks (센서 네트워크에서 이벤트 검출 및 필터링을 위한 경로기반 네트워크-내 조인 프로세싱 방법)

  • Jeon, Ju-Hyuk;Yoo, Jae-Soo;Kim, Myoung-Ho
    • Journal of KIISE:Databases
    • /
    • v.33 no.6
    • /
    • pp.620-630
    • /
    • 2006
  • Event-detection is an important application of sensor networks. Join operations can facilitate event-detection with a condition table predefined by a user. When join operations are used for event-detection, it is desirable, if possible, to do in-network join processing to reduce communication costs. In this paper, we propose an energy-efficient in-network join algorithm, called PBA. In PBA, each partition of a condition table is stored along the path from each node to the base station, and then in-network joins are performed on the path. Since each node can identify the parts to store in its storage by its level, PBA reduces the cost of disseminating a condition table considerably Moreover, while the existing method does not work well when the ratio of the size of the condition table to the density of the network is a little bit large, our proposed method PBA does not have such a restriction and works efficiently in most cases. The results of experiments show that PBA is efficient usually and especially provides significant cost reduction over existing one when a condition table is relatively large in comparison with the density of the network, or the routing tree of the network is high.

Design and Evaluation of a NIC-Driven Host-Independent Network System (네트워크 인터페이스 카드에 기반한 호스트 독립적인 네트워크 시스템의 설계 및 성능평가)

  • Yim Keun Soo;Cha Hojung;Koh Kern
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.11
    • /
    • pp.626-634
    • /
    • 2004
  • In a client-server model, network server systems suffer from both heavy communication and computational loads. While communication channels become increasingly speedy, the existing protocol stack architectures still include mainly three performance bottlenecks of protocol stack processing, system call, and network interrupt overheads. To address these obstacles, in this paper we present a host-independent network system where a network interface card (NIC) is utilized in an efficient manner. First, by offloading network-related portion to the NIC, the host can fully utilize its processing power for other useful purposes. Second, it eliminates the system call overhead, such as context-switching and memory copy operations, since the host communicates with the NIC through its user-level libraries. Third, it a] so reduces the network interrupt operation count as the host handles the interrupt in a segment instead of a packet. The experimental results show that the proposed network system reduces the host CPU overhead for communication system by 68-71%. It also shows that the proposed system improves the communication speed by 11-83% under heavy computational and communication load conditions.

Suitability Analysis of Numerical Models Related to Seepage through a Levee (제방 침투 수치해석 모형의 적합성 분석)

  • Im, Dong-Kyun;Yeo, Hong-Koo;Kim, Kyu-Ho;Kang, Jun-Gu
    • Journal of Korea Water Resources Association
    • /
    • v.39 no.3 s.164
    • /
    • pp.241-252
    • /
    • 2006
  • Numerical models for seepage analysis are useful tools to analyze problems and design protection techniques that are related to seepage through a levee. Though every model may have its own limitations and shortcomings, there were no generalized verifications or calibrations for the commercial models. It means that users can run the model and get the result without understanding nor taking any enough training. This paper Investigates applicability and suitability of some seepage numerical models by comparing analytical solutions with experiments in the user's viewpoint. The results showed that it is more desirable to use analyses with unsaturated-unsteady condition rather than those with saturated-steady conditions, since seepage phenomenon of real levees are changed according to water level and soil property. This study also compared the calculated unsteady solutions with the calculated steady solutions for the levee at Koa of the Nakdong River The comparison revealed that as the result, the safety factor of $2.0{\sim}3.5$ has the same effects for seepage protection techniques when they are designed on the basis of steady-state analysis.

Problems in Quantification of Adequacy of Academic Library Collections -Critical Analysis of Standards for Academic Libraries in the U.S.- (종합대학 도서관장서의 적정량기준 설정에 관한 고찰 -미국의 종합대학도서관기준을 중심으로-)

  • Chung Young Sun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.8
    • /
    • pp.183-207
    • /
    • 1981
  • Library standards have been the source of considerable controversy, whereas many problems are involved in developing stardard for university library collections. For evaluation purposes, standards should be precise, quantifiable and measurable. In the United States, however, standards for academic libraries are limited to qualitative statements and principles. Quantitative standards, when given, are ususally related to the number of population in the institution being served, or the prescribed quantitative objectives are often arbitrarily formulated by value judgements. The study in this paper attempts to explain the problems involved in developing quantitative standard for academic library collections. Two problems facing in the formulation of the optimal size of collection are identified. One is the theoretically faulty concept of adequacy of collection to meet the situations of diversity of university libraies, and the other is the difficulties in quantification and measurement, along with the lack of concept of adequacy of collection. However, quantification of adequate size of collection is proved to be useful on the pratical level, even though not valid theoretically. ACRL, Clapp/Jordan and Voigt developed formulas or models for setting the optimal size of a library collection for any particular university library. The main purpose of this study is the analysis of the above formulas. ACRL standard was drawn from obervation and analysis of statistcs in leading library collections. In academic field, this judgement appears to have been based on the assumption that a high-grade institution would be apt to have a good library collection. This study criticizes ACRL standard for its failure to include some determinants of measurements, and points out the limitations of the standard. In contrast. Clapp/Jordan developed a formula rather scientifically based upon bibliographical sources. This is similarly empirical but has the advantage of bringing into play the elements which make universities diverse in nature. Both ACRL and Clapp/Jordan formulas share two major defects. (1) the specific subject needs of the collection are not indiacted directly, and (2) percentage rate of growth is an indicator in measuring the potential utility of a collection. Thus both formulas failed to provide a basis for meaningful evaluation. Voigt further developed a model for determining acquisition rates for currently published materials based on bibliographic technique. Voigt model encourages experimentation with different programs and different allocations of input resources, designed to meet the needs of the library's particular population. Standard for university library collections can be formulated in terms of input(traditional indicator), or additionally, in terms of output(cost-effectiveness). Cost effectiveness is expressed as user satisfaction, ability to provide wanted materials within a reasonable time period. Thus simple quantitative method does not cover all the situations of diversity of university library collections, nor measures the effectiveness of collections. Valid standard could not be established without further research.

  • PDF

Coverage Enhancement in TDD-OFDMA Downlink by using Simple-Relays with Resource Allocation and Throughput Guarantee Scheduler (TDD-OFDMA 하향링크에서의 단순 릴레이를 이용한 자원 할당과 수율 보장 스케줄러를 사용한 서비스 커버리지 향상에 관한 연구)

  • Byun, Dae-Wook;Ki, Young-Min;Kim, Dong-Ku
    • Journal of Advanced Navigation Technology
    • /
    • v.10 no.3
    • /
    • pp.275-281
    • /
    • 2006
  • Simple-relay aided resource allocation (SRARA) schemes are incorporated with throughput guarantee scheduling (TGS) in IEEE 802.16 type time division duplex - orthogonal frequency division multiple access (TDD-OFDMA) downlink in order to enhance service coverage, where the amount of resources for relaying at each relay is limited due to either its available power which is much smaller than base station (BS) power or the overhead required for exchanging feedback information. The performance of SRARA schemes is evaluated with schedulers such as proportional fair (PF) and TGS at 64kbps and 128kbps user throughput requirements when total MS power is set to 500mW or 1 W. For 64kbps throughput requirement level, more improvement comes from relay than scheduler design. For 128kbps case, it comse from scheduler design than relay due to the fact that simple relay can't help using strictly limited amount of resources for relaying function.

  • PDF

HVIA-GE: A Hardware Implementation of Virtual Interface Architecture Based On Gigabit Ethernet (HVIA-GE: 기가비트 이더넷에 기반한 Virtual Interface Architecture의 하드웨어 구현)

  • 박세진;정상화;윤인수
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.5_6
    • /
    • pp.371-378
    • /
    • 2004
  • This paper presents the implementation and performance of the HVIA-GE card, which is a hardware implementation of the Virtual Interface Architecture (VIA) based on Gigabit Ethernet. The HVIA-GE card is a 32-bit/33MHz PCI adapter containing an FPGA for the VIA protocol engine and a Gigabit Ethernet chip set to construct a high performance physical network. HVIA-GE performs virtual-to-physical address translation, Doorbell, and send/receive completion operations in hardware without kernel intervention. In particular, the Address Translation Table (ATT) is stored on the local memory of the HVIA-GE card, and the VIA protocol engine efficiently controls the address translation process by directly accessing the ATT. As a result, the communication overhead during send/receive transactions is greatly reduced. Our experimental results show the maximum bandwidth of 93.7MB/s and the minimum latency of 11.9${\mu}\textrm{s}$. In terms of minimum latency HVIA-GE performs 4.8 times and 9.9 times faster than M-VIA and TCP/IP, respectively, over Gigabit Ethernet. In addition, the maximum bandwidth of HVIA-GE is 50.4% and 65% higher than M-VIA and TCP/IP respectively.

Comprehensive Diagnosis and Improvement Plans on Agricultural Production Cost Survey Statistics (농축산물생산비조사 통계의 종합적 품질 진단 및 개선 방안)

  • Koo, Seung-Mo;Kim, Sounghun;Lee, Kay-O;Sohn, Chang-Soo;Han, Suk-Ho
    • Journal of agriculture & life science
    • /
    • v.45 no.6
    • /
    • pp.291-301
    • /
    • 2011
  • This study is based on the diagnosis process on agricultural production cost survey, which is one of the most representative public statistics of agricultural sector in Korea. The diagnosis were performed by employing the quantitative and qualitative approaches with the official guideline provided by the Ministry of Statistics. The various results were produced from the aspects of exactness, relevance, timeliness, accessibility, and comparability, which were based on the qualitative approaches including focus group interview (FGI) with professional users. The results from statistical portfolio analysis implies that the first priority to improve the statistics is given to 'satisfaction level corresponding to user cost' and 'offering sufficient explanation'. The comprehensive results, discussed with the administrative office, are summarized into the following two major points. First, classification of the detailed items should be improved to avoid users' confusion. However, the re-classification need to be professionally reviewed with the relevant administrative office such as Rural Development Administration, producing similar statistics. Second, the KOSIS system is found to be constantly upgraded to improve the users' convenience.